SlideShare une entreprise Scribd logo
1  sur  11
Computer Viruses
And
Hacking
Created By .Bilal Hamid
9-1
Computer Viruses
Computer Virus is a malware
(file/method/software) designed to crash the
operating system and also designed to modify
the computer.
Types Of Viruses
• There are many types of computer viruses
Some are listed below
1. Trojan Horse Viruses
Trojan (Trojan Horse) viruses are the malware
which gain access to operating system and crash
the computer in few days.
2. Win32/Simile Viruses
Win32/Simile is a metamorphic computer
virus written in assembly language for Microsoft
Windows . It affects the executable file.
3. AGI-Plan Viruses
AGI-Plan virus is a virus which finds memory
resident DOS-File and infect it . This way the PC
will crash.
4. Ambulance Virus
Ambulance Virus or Ambulance Car Virus is a virus
which locate for MS-DOS Files , then overwrites in
it.
5. Stoned Virus
It is the part of BOOT SECTOR VIRUS(1987) . This
virus affects only the screen and the pc stoned
How To Protect
1. Use Antivirus Programs
2. Use Firewalls
3. Make Passwords Encrypted
4. Scan your PC Daily
5. Switch off net when not using
6. Use Chrome Explorer for safe download
7. Don’t download software from unknown source
8. Disable Auto run
9. Deploy DNS Protection
10.Download anti-spyware program
How To Make A Virus Using Notepad
Number One- (Harmless Virus)
(Can be DELETED)
Open Notepad And Write
Set oWMP = CreateObject("WMPlayer.OCX.7“
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop
Save this in notepad as virus.vbs in documents and
after every 2 mins the CD inserted will eject.
Number Two- (Harmful Virus)]
(Can't be DELETED)
Open Notepad And
Write
@echo off
:start
And save as .bat
Double click and your pc will crash
Note : @Echo is the code word for
computer to listen command
Computer Hacking
Hacking is the process of gaining
access to Passwords , Keys ,
Documents , OR accessing the
Computer Files without knowing
owner.
Types Of Hacking
1. Phishing
It is a method to send email and Hack
2. Smishing
It is a method to send messages and Hack
3. Malware
It is a method to download software's without
permission and Hack
How To Protect
1. Use Antivirus Programs
2. Use Firewalls
3. Make Passwords Encrypted
4. Scan your PC Daily
5. Switch off net when not using
6. Use Chrome Explorer for safe download
7. Don’t download software from unknown source
8. Disable Auto run
9. Deploy DNS Protection
10.Download anti-spyware program
THANK YOU
Created By : BILAL
HAMID
Grade : 9-1
A . C . I . S . J

Contenu connexe

Tendances

Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
Rakibul islam
 
10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time
AlefyaM
 

Tendances (20)

Computer Virus 2017
Computer Virus 2017Computer Virus 2017
Computer Virus 2017
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
Virus
Virus  Virus
Virus
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
Virus soran university
Virus  soran universityVirus  soran university
Virus soran university
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Computer Viruses and Protections
Computer Viruses and ProtectionsComputer Viruses and Protections
Computer Viruses and Protections
 
Major Computer Virus Types to Watch Out
Major Computer Virus Types to Watch OutMajor Computer Virus Types to Watch Out
Major Computer Virus Types to Watch Out
 
10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cure
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 

Similaire à Computer viruses

Seminar project(computer virus)
Seminar project(computer virus)Seminar project(computer virus)
Seminar project(computer virus)
cdebraj16101991
 
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptxpresentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
NORTHCUSTOMS
 
Nimda Wor Mv2
Nimda Wor Mv2Nimda Wor Mv2
Nimda Wor Mv2
Goaway96
 
Web virus activity
Web virus activityWeb virus activity
Web virus activity
Sim_Dhillon
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
sankhadeep
 

Similaire à Computer viruses (20)

Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Virus project
Virus projectVirus project
Virus project
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Seminar project(computer virus)
Seminar project(computer virus)Seminar project(computer virus)
Seminar project(computer virus)
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptxpresentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Nimda Wor Mv2
Nimda Wor Mv2Nimda Wor Mv2
Nimda Wor Mv2
 
Web virus activity
Web virus activityWeb virus activity
Web virus activity
 
Trojan ppt pianca
Trojan ppt piancaTrojan ppt pianca
Trojan ppt pianca
 
Null mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya JamkhandeNull mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya Jamkhande
 
Malware
MalwareMalware
Malware
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computervirus
Computervirus Computervirus
Computervirus
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 

Dernier

Dernier (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Computer viruses

  • 2. Computer Viruses Computer Virus is a malware (file/method/software) designed to crash the operating system and also designed to modify the computer.
  • 3. Types Of Viruses • There are many types of computer viruses Some are listed below 1. Trojan Horse Viruses Trojan (Trojan Horse) viruses are the malware which gain access to operating system and crash the computer in few days. 2. Win32/Simile Viruses Win32/Simile is a metamorphic computer virus written in assembly language for Microsoft Windows . It affects the executable file.
  • 4. 3. AGI-Plan Viruses AGI-Plan virus is a virus which finds memory resident DOS-File and infect it . This way the PC will crash. 4. Ambulance Virus Ambulance Virus or Ambulance Car Virus is a virus which locate for MS-DOS Files , then overwrites in it. 5. Stoned Virus It is the part of BOOT SECTOR VIRUS(1987) . This virus affects only the screen and the pc stoned
  • 5. How To Protect 1. Use Antivirus Programs 2. Use Firewalls 3. Make Passwords Encrypted 4. Scan your PC Daily 5. Switch off net when not using 6. Use Chrome Explorer for safe download 7. Don’t download software from unknown source 8. Disable Auto run 9. Deploy DNS Protection 10.Download anti-spyware program
  • 6. How To Make A Virus Using Notepad Number One- (Harmless Virus) (Can be DELETED) Open Notepad And Write Set oWMP = CreateObject("WMPlayer.OCX.7“ Set colCDROMs = oWMP.cdromCollection do if colCDROMs.Count >= 1 then For i = 0 to colCDROMs.Count - 1 colCDROMs.Item(i).Eject Next For i = 0 to colCDROMs.Count - 1 colCDROMs.Item(i).Eject Next End If wscript.sleep 5000 loop Save this in notepad as virus.vbs in documents and after every 2 mins the CD inserted will eject.
  • 7. Number Two- (Harmful Virus)] (Can't be DELETED) Open Notepad And Write @echo off :start And save as .bat Double click and your pc will crash Note : @Echo is the code word for computer to listen command
  • 8. Computer Hacking Hacking is the process of gaining access to Passwords , Keys , Documents , OR accessing the Computer Files without knowing owner.
  • 9. Types Of Hacking 1. Phishing It is a method to send email and Hack 2. Smishing It is a method to send messages and Hack 3. Malware It is a method to download software's without permission and Hack
  • 10. How To Protect 1. Use Antivirus Programs 2. Use Firewalls 3. Make Passwords Encrypted 4. Scan your PC Daily 5. Switch off net when not using 6. Use Chrome Explorer for safe download 7. Don’t download software from unknown source 8. Disable Auto run 9. Deploy DNS Protection 10.Download anti-spyware program
  • 11. THANK YOU Created By : BILAL HAMID Grade : 9-1 A . C . I . S . J